Empowerment Technologies - W1L2
Empowerment Technologies - W1L2
Empowerment Technologies - W1L2
TECHNOLOGIES
MS. JOCEL B. PARDO
ACTIVITY 3: GALLERY WALK
Direction:
1. Images will be shown in the screen.
2. Each group will be given 2-3 minutes to write their
observation on the given images.
3. Students will share their observation about the image.
LEARNING COMPETENCIES
The learners will be able to:
• Apply online safety, security, ethics, and etiquette standards and practice
in the use of ICTs.
• Discuss what constitutes appropriate and inappropriate online behavior;
• Discern possible deceptive information and wrongly evaluated data; and
• Understand the importance of making judgment calls on possible
implications and consequences of making certain information public.
TOPIC OUTLINE
Love
Letter
VIRUS & WORM
Virus
Infection on
a Flash Drive
OTHER TYPES OF THREATS
• Computer Bug
• Cyber Stalking
• Cyber Bullying
• Cyber Harassment
• Spam
• Spoofing
OTHER TYPES OF THREATS
• Computer Bug
• Cyber Stalking
• Cyber Bullying
• Cyber Harassment
• Spam
• Spoofing
NETIQUETTE
• Comes from the word Network and Etiquette.
• Set of rules and norms for acceptable conduct
or behavior online.
COMPUTER ETHICS
• Concerned with how computing professionals
should make decisions regarding professional
and social conduct.
CORE RULES
OF
NETIQUETTE
PRIVACY
• Refers to the right of individuals to deny or
restrict the collection and used of information
about them.
HOW DO WE MAINTAIN
OUR PRIVACY?
AUTHENTICATION